Cyber security involves protecting computer systems and networks from criminal activity like fraud, theft, and blackmail. It aims to protect information and property while allowing authorized access. The field is growing due to increased internet connectivity of devices and the need to secure critical systems and infrastructure. Cyber security education covers traditional security topics like cryptography as well as emerging areas like cloud, mobile, and cyber-physical security. Career opportunities in cyber security include security analyst, engineer, architect, and administrator roles.
2. ABSTRACT
. Cyber Security restricted to describing the criminal activity
in which the Computer or network is a part of Crime like
fraud, theft & black mail
. Cyber Security includes Protection from theft, corruption or
natural disaster while allowing the information & property
remain accessible
. Cyber Security helps to understand the cyber Security
Strategy, science of Cyber Security, Cyber Ecosystem
.Cyber Security deals with Securing the future-”SECURING
FOR TOMORROW’S WORLD”
3. • The explosive growth, complexity, adoption and
dynamism of cyber space that have enhanced
social interaction & expanded our ability
• Cyber Security is an issue to be broad, there are
too many devices being connected to the internet
that have variable security
• The world wide security technology & service
market is forecast to reach 67.2 billion in 2013, up
8.7 percent from 61.8 billion in 2012 according to
Gartner
INTRODUCTION
4. • Protect the information & services from
unintended & unauthorized access
• Allowing the information & property to
remain accessible & productive to it’s
intended user
• Protect from unplanned events & natural
disaster
• Anticipate the techniques targets of known,
new & emerging sophisticated threats
OBJECTIVE
5. • Growth of Cyber Security is very strongly
demanded from industry & government for
trained professionals, facing a skill gap
• In an interconnected world reliant upon
smartphones, social media, e-commerce &
cloud services, information security impacts
more & more on public
• Cyber Security is more significantly
expanded with more domains to secure &
more ways to attack
UNDERSTANDING THE NEED & TRENDS
6. • Cyber Security education covers new area like
Cyber physical attack, the protection of
heterogeneous system & real time security data
analysis
• The existing programs covers the traditional
security ( cryptography ) & emerging technical
area( cloud & mobile security )
• Designing & managing security for networks,
software,hardware,data & applications is crucial
7. SCIENCE OF CYBER SECURITY
• Critical cyber system must trust, inspire &
confidence, predictably protect integrity of
data owners, & perform securely,&
reliably
• Security science should have broad
applicability, transcending specific system
• Cyber Security issues is relegated on
increasing openness & collaboration,
along with immediate priorities
7
8. INTER-RELATED CYBER ECOSYSTEM
• Automation helps to incorporate
decisions & action taken in response to
cyber events
• Interoperability defined as policies &
allows for seamless & dynamic
collaboration
• Authentication provides assurance that
participants are authentic or genuine
8
9. CYBER SECURITY POLICIES
• Cyber Security act of 2010 seek to
increase collaboration between public &
private sector of cyber security issues
• International cyber crime reporting &
cooperation act directs the president to
give priority for assistance to improve
legal, judicial, & enforcement capabilities
with respect to cyber crime to countries
with low information technology
9
10. • Protecting Cyberspace as a national
assets act of 2010 would grant the
president emergency powers over the
internet
• National Cyber Defenses initiatives of
Berlin is to detect & prevent attack
against the national infrastructure
10
11. COMPUTER PROTECTION
• Hardware security solutions can prevent
the read & write access to data
• Secure operating system protect the
application code from malicious
subversion
• Secure coding protect to execute putative
data & the attacker couldn’t control of the
processors
11
As you have done the TERM PAPER after the first year, it is an individual understanding and work under the offline supervision of faculty mentor.
The purpose of the term paper is know something about the research, how do write the research paper etc.
It is the first team work which you students will do under the direct supervision and guidance of the faculty mentor(s).
Consider it is the first technical project so implement your knowledge.